• Home
Name Date Size #Lines LOC

..--

allowlists/04-Jul-2025-359221

examples/04-Jul-2025-3,0902,248

network_proxy/04-Jul-2025-1,283938

testcases/04-Jul-2025-2,4021,749

unwind/04-Jul-2025-661497

util/04-Jul-2025-2,9902,322

BUILDD04-Jul-202536.3 KiB1,1351,074

CMakeLists.txtD04-Jul-202534.1 KiB1,3071,240

README.mdD04-Jul-2025607 1711

allow_all_syscalls.hD04-Jul-2025837 214

allow_map_exec.hD04-Jul-2025821 214

allow_seccomp_speculation.hD04-Jul-2025865 214

allow_unrestricted_networking.hD04-Jul-2025881 214

bpf_evaluator.ccD04-Jul-20256.6 KiB235220

bpf_evaluator.hD04-Jul-2025591 2312

bpf_evaluator_test.ccD04-Jul-20259.8 KiB305276

bpfdisassembler.ccD04-Jul-20258 KiB258224

bpfdisassembler.hD04-Jul-20251.1 KiB3812

bpfdisassembler_test.ccD04-Jul-20255.7 KiB154137

buffer.ccD04-Jul-20252.3 KiB8052

buffer.hD04-Jul-20252 KiB6625

buffer_test.ccD04-Jul-20253.1 KiB9458

client.ccD04-Jul-202513.4 KiB382289

client.hD04-Jul-20253.9 KiB12247

comms.ccD04-Jul-202519.5 KiB680544

comms.hD04-Jul-202511.4 KiB334206

comms_test.ccD04-Jul-202513.2 KiB472366

comms_test.protoD04-Jul-2025709 2319

executor.ccD04-Jul-20256.2 KiB196143

executor.hD04-Jul-20255.7 KiB17398

fork_client.ccD04-Jul-20252.7 KiB9161

fork_client.hD04-Jul-20252 KiB6934

forkingclient.ccD04-Jul-20251.7 KiB5126

forkingclient.hD04-Jul-20251.6 KiB4817

forkserver.ccD04-Jul-202526 KiB742573

forkserver.hD04-Jul-20253.5 KiB10245

forkserver.protoD04-Jul-20252.6 KiB9675

forkserver_bin.ccD04-Jul-20252.8 KiB7743

forkserver_test.ccD04-Jul-20253.2 KiB11372

global_forkclient.ccD04-Jul-202510 KiB325264

global_forkclient.hD04-Jul-20253.7 KiB11476

global_forkclient_lib_ctor.ccD04-Jul-20251.3 KiB3715

ipc.ccD04-Jul-20253.4 KiB11278

ipc.hD04-Jul-20253.4 KiB9836

ipc_test.ccD04-Jul-20254.3 KiB13086

limits.hD04-Jul-20254.6 KiB14076

limits_test.ccD04-Jul-20254.3 KiB12286

logserver.ccD04-Jul-20251.4 KiB4522

logserver.hD04-Jul-20251.2 KiB4115

logserver.protoD04-Jul-2025793 2622

logsink.ccD04-Jul-20251.8 KiB6132

logsink.hD04-Jul-20251.4 KiB4921

monitor_base.ccD04-Jul-202515.3 KiB474382

monitor_base.hD04-Jul-20255.6 KiB17681

monitor_ptrace.ccD04-Jul-202534.9 KiB990801

monitor_ptrace.hD04-Jul-20256.1 KiB17990

monitor_unotify.ccD04-Jul-202516.1 KiB514465

monitor_unotify.hD04-Jul-20254.1 KiB144104

mount_tree.protoD04-Jul-20252 KiB7058

mounts.ccD04-Jul-202528.1 KiB835702

mounts.hD04-Jul-20253.7 KiB11364

mounts_test.ccD04-Jul-202518.4 KiB476379

namespace.ccD04-Jul-202513.1 KiB363265

namespace.hD04-Jul-20252.2 KiB6835

namespace_test.ccD04-Jul-202512.9 KiB350277

network_proxy_test.ccD04-Jul-20258 KiB262209

notify.hD04-Jul-20253.7 KiB10851

notify_test.ccD04-Jul-20257 KiB205151

policy.ccD04-Jul-20259.5 KiB261167

policy.hD04-Jul-20253.6 KiB11359

policy_test.ccD04-Jul-202512.6 KiB369279

policybuilder.ccD04-Jul-202553.6 KiB1,8711,602

policybuilder.hD04-Jul-202534.1 KiB1,078260

policybuilder_test.ccD04-Jul-202511 KiB295222

regs.ccD04-Jul-20257.5 KiB214172

regs.hD04-Jul-20253.4 KiB13486

regs_test.ccD04-Jul-20253.2 KiB10379

result.ccD04-Jul-20256.9 KiB217189

result.hD04-Jul-20256.7 KiB219113

sandbox2.ccD04-Jul-20254.5 KiB150109

sandbox2.hD04-Jul-20254.1 KiB12860

sandbox2_test.ccD04-Jul-202510 KiB276209

sanitizer.ccD04-Jul-20255.8 KiB191143

sanitizer.hD04-Jul-20252.4 KiB6519

sanitizer_test.ccD04-Jul-20255 KiB157112

stack_trace.ccD04-Jul-202511.6 KiB355264

stack_trace.hD04-Jul-20252.9 KiB9146

stack_trace_test.ccD04-Jul-202511.5 KiB334280

syscall.ccD04-Jul-20252.8 KiB9465

syscall.hD04-Jul-20252.7 KiB8749

syscall_defs.ccD04-Jul-2025103.6 KiB2,1302,072

syscall_defs.hD04-Jul-20256.7 KiB259215

syscall_test.ccD04-Jul-20252.1 KiB6741

testing.hD04-Jul-2025850 224

trace_all_syscalls.hD04-Jul-2025843 214

util.ccD04-Jul-202523.7 KiB714578

util.hD04-Jul-20256.4 KiB17575

util_test.ccD04-Jul-202516.2 KiB444385

README.md

1# Sandbox2
2
3Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted
4programs or portions of programs in confined environments. The idea is that the
5runtime environment is so restricted that security bugs such as buffer overflows
6in the protected region cause no harm.
7
8## Documentation
9
10Detailed developer documentation is available on the Google Developers site for Sandboxed API under
11[Sandbox2](https://developers.google.com/code-sandboxing/sandbox2).
12
13There is also a
14[Getting Started](https://developers.google.com/code-sandboxing/sandbox2/getting-started)
15guide for Sandbox2.
16
17